×

Establishing a trusted login procedure

  • US 10,673,834 B2
  • Filed: 11/10/2017
  • Issued: 06/02/2020
  • Est. Priority Date: 05/12/2015
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for a trusted login procedure, comprising:

  • receiving, at a first server that provides a first service and from a terminal, a first login request for the first service;

    generating, by a hardware processor at the first server, device identifier information of the terminal;

    associating, by the hardware processor at the first server, the device identifier information of the terminal with first login state information, wherein the first login state information indicates that the terminal was verified and has logged into the first server successfully;

    transmitting, to a second server, the device identifier information and the first login state information, wherein the second server provides a second service that has a trusted login relationship with the first service, wherein the second server establishes second login state information for the second service based on the first login state information, and wherein the second server associates the device identifier information of the terminal with the second login state information;

    receiving, at the first server and from the second server, a validity query;

    determining, by the hardware processor at the first server, whether the terminal has a valid login state with the first server;

    transmitting, by the hardware processor at the first server, a validity response to the second server, wherein the validity response indicates whether the terminal has the valid login state with the first server; and

    in response to transmission of the validity response to the second server, transmitting an access response from the second server to the terminal indicating the success or failure of the trusted login procedure.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×